F5 Networks: Access Policy Manager

1 of 10

F5 Networks: Access Policy Manager

F5 Networks combined mobile device management products from AirWatch, MobileIron, SilverbackMDM and Zenprise into F5's mobile access platform. Enterprises can reduce the costs associated with mobility deployment and management while gaining control. Full VPN and route control capabilities are also extended to users trying to access applications behind the corporate firewall.

2 of 10

Sophos: SafeGuard 6

Sophos will be showing off the latest version of SafeGuard Enterprise, its encryption product for public, private and hybrid cloud environments. SafeGuard Enterprise 6 features the ability to define encryption of any data and control the keys as it travels from the back end, through anyone's cloud and to any endpoint.

3 of 10

x.o.ware: ExoNetwork

ExoNetwork allows users to securely access the Internet even when on an insecure wireless network by using a private server that implements two-factor authentication with a unique 256-bit key for each user. ExoKey is a USB appliance that provides encrypted remote access to everything connected to the ExoNetwork.

4 of 10

Trustwave: Managed Web Application Firewall

Trustwave Managed Web Application Firewall provides Web applications with real-time, continuous security and protection from vulnerabilities and data loss without impacting performance. The managed security service offering sends events from a Trustwave Web application firewall appliance to Trustwave Security Operations Centers, where security experts use Trustwave SIEM technology to correlate and analyze application-specific events to generate alerts.

5 of 10

IronKey: Trusted Access Enterprise Service

IronKey's Trusted Access Enterprise Service is a virtualized workspace for cloud applications and includes a Cisco VPN client and Citrix Receiver for behind the firewall access. The integrated cloud-based network security and data loss prevention services help administrators manage the extended enterprise. Pricing starts at $10 per month per user and is expected to be available in the second quarter.

6 of 10

GlobalScape: Secure Mobile Access

The Secure Mobile Access adds the secure file access technology from TappIn to GlobalScape's Enhanced File Transfer Server. The Secure Mobile Access module helps businesses streamline the transition to multi-mobile platform environments-enabling users to conveniently access, edit and share business files from most smartphones, tablets and other mobile devices at any time, and without compromising corporate security policies.

7 of 10

Cyber-Ark Software: Privileged Session Management Suite v7

The latest version of the Privileged Session Management Suite offers real-time monitoring capabilities to allow administrators to detect and terminate suspicious activity immediately. Cyber-Ark lets administrators isolate, control and monitor activity to protect databases, virtual environments, network devices and servers from insider and external threats.

8 of 10

Qualys: QualysGuard WAF

QualysGuard WAF is a cloud service that protects Websites from unwanted requests and a range of online threats from spammers to SQL injection to DDoS. The Web application firewall provides increased Website performance through caching, compression and content optimization. Qualys is making the service available only as a beta.

9 of 10

CA Technologies: SiteMinder, DataMinder

CA Technologies added content-aware identity and access management capabilities to its CA SiteMinder and CA DataMinder products to help organizations protect data stored, accessed and used within Microsoft SharePoint. Users will have access to single sign-on, automatic data discovery, data classification and content-aware access control as part of the SharePoint Security product.

10 of 10

Kobil Systems: mIDentity App Security Toolkit

Kobil's mIDentity Trusted Web View is an application for secure authenticated mobile Web browsing. The mIDentity Trusted Messages Sign is an application designed to replace weak and costly one-time password services that use text messages or phone callbacks with authenticated transaction messages that cost less.

Top White Papers and Webcasts